• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.024 seconds

The Impact of Brand Diversification on Firm Performance: A Study Restaurant Firms (외식기업의 브랜드 다각화가 수익성에 미치는 영향에 관한 연구)

  • Min, Ha-Na;Kim, In-Jung;Choi, Kyu-Wan
    • Journal of the Korean Society of Food Culture
    • /
    • v.29 no.6
    • /
    • pp.593-598
    • /
    • 2014
  • Brands play a critical role as a core asset and the primary driver for corporate growth because of their power of identity and influence on customers' perceptions in restaurant industry. However, in spite of diverse and dynamically changing recent brand portfolio strategies of restaurants, a study on the effect of brand diversification on financial performance has been rarely conducted in the restaurant industry context. Considering competing viewpoints regarding diversification's influence on financial performance, the purpose of this study is, therefore, to examine the effect of brand diversification on firm performance of restaurants. The results indicated that brand diversification is positive effect to profitability. Brand diversification seems to be attractive and might be a reasonable growth strategy to expand market power by satisfying diverse consumer needs. Therefore, restaurant managers should be consider in implementing brand diversification strategy especially in dynamically changing trend of brand diversification in the current restaurant industry.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

Relationship Brand Orientation and Internal Brand Equity at Internet Service Providers: An Organization Change Readiness Effect

  • TOBING, Rudy P.;SUROSO, SUROSO;HALIM, Rizal Edy;ALIF, Gunawan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.181-193
    • /
    • 2020
  • The midst competition makes a brand all together with its offering products and services is becoming a crucial element for company existence. This requires direct involvement from internal organizational to develop effective strategic branding. According to Asosiasi Penyelenggara Internet Indonesia (APJII), Indonesia's internet penetration is among the highest in Asia. The purpose of this research is to improve the strategic role of brand orientation within Internet Service Provider (ISP) for maximizing return on the company's financial and non-financial benefits by proposing organization change readiness variable. The data collection is taken using an online survey with a non-parametric sampling method and collected 68 qualified respondents for data analysis using SEM-PLS (Structural Equation Modeling with Partial Least Square). The result indicates partial hypotheses on the constructed model between variables brand orientation, brand commitment, and internal brand equity is acceptable. Another finding is stated hypotheses on organization change readiness as moderation is not accepted and means there is no significance to the constructed model. The main conclusion resumes associative human memory can shape up organization change readiness inside internal toward then brand. Relevant cues generate information received in the human brain then will create common associative and becoming social identity on internal brand equity.

A Study on Nursing Students' Experience during Clinical Practice at a Public Health Center (내러티브 탐구를 통한 일 대학 간호학생들의 보건소실습 경험 연구)

  • Choi, Hye-Jung
    • Journal of Korean Public Health Nursing
    • /
    • v.19 no.2
    • /
    • pp.217-228
    • /
    • 2005
  • Purpose: The purpose of this study is to understand nursing students' experiences during clinical practice at a public health center. Method: This research used narrative inquiry far data collection. From April 2005 to June 2006, data collection was conducted by open-ended interview, questionnaire and close observation. The participants, who were student nurses, were willing to take part in this study. Results: On the basis of these data, the experiences of clinical practice at public health center were: 1) when the student nurses begin clinical practice at public health centers for the first time, most of the students feel fearful, nervous and stressed. They also mentioned having a hard time being polite to clients and the staff. 2) The students had new experiences at the health public center compared with clinical practice. Especially, the student nurses who were determined to be good nurses were doing home visiting care service. Not only did they have the opportunity to confirm their identity as nurses, but also the students change their career course from clinical nursing to public health nursing. 4) They reflected on themselves after home visiting care service. Conclusion: On the basis of these findings, the following recommendations are made. 1) Data collection and analysis are needed, net only through the narrative method, but also through other various qualitative methods. 2) Comparative study is necessary to enhance clinical experiences through the analysis of the interfering factors and the original experiences.

  • PDF

Determinants of Caregivers' Conflict Experience in Elderly Care Institutions (요양기관 간병인의 갈등 경험에 영향을 미치는 요인)

  • Lee, Ji-Eun;Jin, Ki-Nam;Seo, Young-Joon
    • Korea Journal of Hospital Management
    • /
    • v.14 no.3
    • /
    • pp.66-82
    • /
    • 2009
  • The purpose of this study is to investigate the determinants of caregiver's conflict experience in elderly care institutions. This study focused on the three key independent variable groups(e.g., socio-demographic, job-related, and individual personality). The sample used in this study are 311 caregivers who are randomly selected from 21 elderly care institutions in Korea. Data were collected with a structured questionnaire by mail from Oct. 15 to Nov. 30 in 2007. The collected data were analyzed using logistic regression. The major findings of the study are as follows: 1) Nearly 40% percent of the respondents reported that they had experienced conflicts with elderly patients. The conflict with other caregivers ranked as second(20.6%), followed by patients' families(18.6%) and hospital employees(15.1%). 2) The personality, especially uniqueness caused conflict with patients or other caregivers. The professional identity reduced conflict with patients. The negative work experiences caused conflict with patients or family. The service attitude reduced conflict with family. The service-centered culture reduced conflict with hospital employees. Those who lived with the elderly showed lower level of conflict with family or hospital employees.

  • PDF

A Research on the Effect of Foreign Passengers' Satisfaction on Specialized Cabin Services on Long Haul Flight to Their Loyalty through Airline's Brand Asset (장거리노선 기내특화서비스에 대한 외국인 승객의 만족도가 항공사의 브랜드 자산을 매개로 하여 고객충성도에 미치는 영향에 대한 연구)

  • Kim, Kwang Il;Gwon, Eun Hyeong;Kim, Kee Woong;Park, Sung Sik
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.3
    • /
    • pp.65-77
    • /
    • 2013
  • A high brand reputation of a airline means the airline is preferred by passengers because of its unique services being even better than others. This is why airline's specialized services are important in that those services would create a new brand value and build up the airline's brand image, being enable to have competitive advantage over other airlines, to provide satisfied services, to have a mutual trust between passengers and the airline and to create customer's loyalty. A-Airline have been trying to give passengers a joy of flight by providing its customized and specialized cabin services out of airlnes' stereo-typed services.Therefore this paper will find out how their satisfaction of the cabin services have a positive impact on customer loyalty through brand image, brand reputation, brand identity and brand attraction. Those services would not only contribute to upgrade A-airline's corporate image but show the way to which the cabin service is heading also.

A Step towards User Privacy while Using Location-Based Services

  • Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.618-627
    • /
    • 2014
  • Nowadays mobile users are using a popular service called Location-Based Services (LBS). LBS is very helpful for a mobile user in finding various Point of Interests (POIs) in their vicinity. To get these services, users must provide their personal information, such as user identity or current location, which severely risks the location privacy of the user. Many researchers are developing schemes that enable a user to use these LBS services anonymously, but these approaches have some limitations (i.e., either the privacy prevention mechanism is weak or the cost of the solution is too much). As such, we are presenting a robust scheme for mobile users that allows them to use LBS anonymously. Our scheme involves a client side application that interacts with an untrusted LBS server to find the nearest POI for a service required by a user. The scheme is not only efficient in its approach, but is also very practical with respect to the computations that are done on a client's resource constrained device. With our scheme, not only can a client anonymously use LBS without any use of a trusted third party, but also a server's database is completely secure from the client. We performed experiments by developing and testing an Android-based client side smartphone application to support our argument.

Identification of chromosomal translocation causing inactivation of the gene encoding anthocyanidin synthase in white pomegranate (Punica granatum L.) and development of a molecular marker for genotypic selection of fruit colors

  • Jeong, Hyeon-ju;Park, Moon-Young;Kim, Sunggil
    • Horticulture, Environment, and Biotechnology : HEB
    • /
    • v.59 no.6
    • /
    • pp.857-864
    • /
    • 2018
  • Previous studies have not detected transcripts of the gene encoding anthocyanidin synthase (ANS) in white pomegranates (Punica granatum L.) and suggest that a large-sized insertion in the coding region of the ANS gene might be the causal mutation. To elucidate the identity of the putative insertion, 3887-bp 5' and 3392-bp 3' partial sequences of the insertion site were obtained by genome walking and a gene coding for an expansin-like protein was identified in these genome-walked sequences. An identical protein (GenBank accession OWM71963) isolated from pomegranate was identified from BLAST search. Based on information of OWM71963, a 5.8-Mb scaffold sequence with genes coding for the expansin-like protein and ANS were identified. The scaffold sequence assembled from a red pomegranate cultivar also contained all genome-walked sequences. Analysis of positions and orientations of these genes and genome-walked sequences revealed that the 27,786-bp region, including the 88-bp 5' partial sequences of the ANS gene, might be translocated into an approximately 22-kb upstream region in an inverted orientation. Borders of the translocated region were confirmed by PCR amplification and sequencing. Based on the translocation mutation, a simple PCR codominant marker was developed for efficient genotyping of the ANS gene. This molecular marker could serve as a useful tool for selecting desirable plants at young seedling stages in pomegranate breeding programs.

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

A Study on Anonymous Authorization based on Short Group Signatures (짧은 그룹 서명 기법 기반의 익명 인가에 대한 연구)

  • Shin, Soo-Yeon;Kwon, Tae-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.11-26
    • /
    • 2011
  • The existing anonymous authentication schemes based on group signatures for protecting privacy do not provide anonymous authorization which is required in the practical environments. In this paper, we propose an anonymous authentication and authorization scheme that enables a service provider both to authenticate anonymously its users and to provide different service according to their authorization. In the proposed scheme, a user's real identity, anonymity and authorization are managed distinctly through the separation of group manager's capabilities and an authorization authority. It is also possible for the proposed scheme to apply various access control models.